First published: Sat Dec 03 2016(Updated: )
In BlueZ 5.42, a buffer over-read was identified in "l2cap_packet" function in "monitor/packet.c" source file. This issue can be triggered by processing a corrupted dump file and will result in btmon crash.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
BlueZ | =5.42 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-9802 is considered a moderate severity vulnerability due to the potential for a btmon crash.
To fix CVE-2016-9802, you should upgrade BlueZ to a version higher than 5.42 that addresses this buffer over-read issue.
CVE-2016-9802 affects users of BlueZ version 5.42 that utilize the btmon tool to monitor Bluetooth traffic.
CVE-2016-9802 is a buffer over-read vulnerability that can lead to application crashes when processing corrupted dump files.
The impact of CVE-2016-9802 is primarily the crash of the btmon monitoring tool which can disrupt Bluetooth analysis.